News


Key TakeawaysDeceptive Tactics: Mobile-optimized phishing sites impersonate PNB MetLife to steal policyholder data and facilitate fraudulent transactions.Data Exfiltration: The maliciousโ€ฆ

|
Published on January 21, 2026

Key TakeawaysSupply Chain Vulnerability: Reports indicate a critical escalation in cyber risks targeting the wholesale and retail sectors through third-partyโ€ฆ

|
Published on January 21, 2026

Key TakeawaysTargeted Campaign: A cyber campaign, dubbed Operation Nomad Leopard, is actively targeting Afghan government employees with spear-phishing emails.Deceptive Lures:โ€ฆ

|
Published on January 21, 2026

Key TakeawaysVulnerability Identified: A misconfigured GraphQL endpoint on the UStrive mentorship platform allowed authenticated users to access the private dataโ€ฆ

|
Published on January 21, 2026
Malicious Extension - Man

Key TakeawaysTargeted Attack: The Evelyn Stealer campaign specifically targets software developers by distributing malware through malicious Visual Studio Code (VSC)โ€ฆ

|
Published on January 20, 2026

Key TakeawaysMassive Exposure: A data breach involving the French Pass'Sport program has exposed approximately 6.4 million email addresses and sensitiveโ€ฆ

|
Published on January 20, 2026
Prompt Injection - Vulnerability - Laptop

Key TakeawaysPrompt Injection Flaw: A significant vulnerability was discovered in Google Gemini that enabled prompt injection attacks via malicious Googleโ€ฆ

|
Published on January 20, 2026
Iran Flag

Key TakeawaysCommunications Disrupted: Protests that began in Tehran in late December escalated into a nationwide crisis affecting Iranโ€™s communications infrastructure.Stateโ€ฆ

|
Published on January 20, 2026

Key TakeawaysBroadcast Interruption: Several Iranian state television channels carried on the Badr satellite were hacked on Sunday.Protest Content Aired: Theโ€ฆ

|
Published on January 20, 2026
Surfshark Launches Post-Quantum Protection on WireGuard

Key TakeawaysSurfshark post-quantum protection: Launched on WireGuard to protect user data from future quantum computing threats.Future-ready VPN security: Uses quantum-resistantโ€ฆ

|
Published on January 20, 2026
Hacker - Laptops - Codes

Key TakeawaysRemote Access Dominance: Remote access compromise has emerged as the leading entry point for ransomware, exploiting stolen VPN credentialsโ€ฆ

|
Published on January 19, 2026

Key TakeawaysNew Details: The individual who pleaded guilty to hacking into the U.S. Supreme Court's electronic filing system and otherโ€ฆ

|
Published on January 19, 2026
Most Wanted

Key TakeawaysInternational Manhunt: German authorities added a Russian national to the EU's most-wanted list for his alleged role as theโ€ฆ

|
Published on January 19, 2026
Attackers and Defenders

Digital systems shape everyday life, often in ways people notice when something breaks. They reveal how personal data is quietlyโ€ฆ

|
Published on January 17, 2026
NordVPN Expands Virtual Server Network with 30 New Locations

Key TakeawaysExpanded Coverage: NordVPN virtual servers increase locations to 79, improving access, privacy, and content availability worldwide for users.Performance &โ€ฆ

|
Published on January 17, 2026
VeePN Chrome Extension Gets Featured on Chrome Web Store - What It Means for You

Key TakeawaysVeePN Chrome extension recognition: Featured badge confirms privacy standards, secure browsing, simple setup, and compliance with Chrome policies.Key featuresโ€ฆ

|
Published on January 17, 2026
Grubhub

Key TakeawaysUnauthorized Access: Grubhub has officially acknowledged that unauthorized individuals accessed and downloaded data from its systems.Extortion Attempts Reported: ShinyHuntersโ€ฆ

|
Published on January 16, 2026
Man holding an envelope targeted by a fishing hook, depicting phishing attack

Key TakeawaysTargeted Espionage: A Chinese-linked cyberespionage group executed a highly targeted campaign against U.S. government and policy officials.Political Lure: Emailsโ€ฆ

|
Published on January 16, 2026
Claude

Key TakeawaysCritical Flaw: A vulnerability in Anthropicโ€™s Cowork AI permits attackers to exfiltrate files via prompt injection without additional userโ€ฆ

|
Published on January 16, 2026
Office - US Flag - Hacker - Email

Key TakeawaysProlonged Disruption: The Russell Township Police Department's email was blocked for nearly two months last year following a suspectedโ€ฆ

|
Published on January 16, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: